placeholder image to represent content

cyber security

Quiz by Sneha Manikandan

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
20 questions
Show answers
  • Q1

    what is cyber security?

    give the data to strangers

    protects the data from digital attack

    support hackers

    30s
  • Q2

    what is firewall?

    used to share data

    barrier between internal network and external network

    search engine

    30s
  • Q3

    Practices related to cyber security?

    two-factor authentication

    safe downloads

    software update

    all the above

    30s
  • Q4

    who is the father of computer security?

    robert

    August kerckhoffs

    charles

    bob thomas

    30s
  • Q5

    Which of the following is a type of cyber security?

    cloud security

    application security

    network security

    All of the above

    30s
  • Q6

    which of the following is not a cyber crime?

    Advance encryption standard

    malware

    man in the middle

    denial of service

    30s
  • Q7

    Which of the following is a component of cyber security?

    Attacks

    Internet of things

    AI

    Data base

    30s
  • Q8

    Which of the following is a type of cyber attack?

    All of the above

    Password attack

    SQL injection

    Phishing

    30s
  • Q9

    Which of the following is not an advantage of cyber security?

    gives privacy to user

    makes the system slower

    protects system against virus

    minimize computer freezing and crashes

    30s
  • Q10

    cyber space was coined by

    William gibson

    Richarad

    robert charles

    Andrew

    30s
  • Q11

    which of the following act violates cyber security?

    exploit

    vulnerability

    attack

    threat

    30s
  • Q12

    Which of the following actions compromise cyber security?

    attack

    Threat

    vulnerability

    exploit

    30s
  • Q13

    Which of the following do cyber attackers commonly target for fetching IP address of a target or a victim user?

    webpages

    IP trackers

    emails

    Websites

    30s
  • Q14

    which of the following is defined as an attempt to harm, damage or cause threat to a system?

    Digital crime

    threats

    system hijacking

    Cyber attack

    30s
  • Q15

    IT security in any firm or organisation is maintained and handled by

    Software security specialist

    security auditor

    IT security engineer

    CEO

    30s

Teachers give this quiz to your class